quinta-feira, 16 de abril de 2020

How To Track Iphone Without Them Knowing

Few feelings are as stomach-sinkingly awful as the thought of losing an expensive new iPhone. Whether you left it on the bus or someone slid it out of your back pocket, we put so much store in our phones that their loss leaves is saddened and angered. Most of us keep at least copies of everything in our lives on our phones, from personal conversations to emails, 


To say nothing of all our personal information and social media accounts. Of course there are security measures in place, but nobody wants to risk having all that information fall into the hands of the wrong people. In this article, I will show you how to find a phone that has been lost, whether your own phone or the phone of a friend or family member.

Can you track an iPhone without them knowing?

First off, hopefully you activated the Find My Phone feature of your iPhone when you still had it in your possession. Secondly, if your phone doesn't have service (and thus a connection to the Internet) or if you don't have iCloud set up, then these solutions are not going to work for you. Unfortunately phone technology is advanced but it isn't magical; if your phone isn't talking to the network or if you haven't turned on Find My Phone, then unfortunately the technological solution is probably not going to work. (Seriously. If you have possession of your phone(s) then stop reading this article, pick up your devices, go to Settings and select "Find My Phone" (iPhone) or "Find My Device" (Android) and make sure they are toggled on. TTjem upi cam dp ot/"

Without further ado, let's find your phone!

Can I Tell if Someone is Tracking my iPhone?

 

image1-3

Usually yes, if someone is using the "Find my Phone" feature, it will be displaying things on the iPhone screen. Thankfully, "Find My iPhone" comes pre-loaded on all phones with iOs 9 or newer. "Find my iPhone" is the gold standard when it comes to locating your lost iPhone. The service is integrated as part of iCloud. Here's how to use it to find your missing iPhone then track down your phone's exact location.

Step 1: Open up the "Find My iPhone" on a different device

It doesn't matter if you decide to use your iPad, your laptop, or a friend's iPhone – you can run the Find My Phone app fr0m Mac. You can use the Find my Phone app.

If you are using an Apple product like another phone or an iPad, you can simply click on the app.

If you are using a computer (even a Windows PC will work), go to icloud.com then click on the "Find iPhone" icon. Once you've clicked on the "Find iPhone" icon the website process and "Find my iPhone" app process are the same.

Step 2: Input Your Apple ID Credentials (they are the same as your iCloud info)

Since you are not using your phone, you won't be automatically logged in.

Once you log in to the app, select the "All Devices" drop-down option and then find the device that you want to locate.

Step 3: Once You Select Your Phone, Options Will Appear

As soon as you select your device on the page, iCloud will begin to search for it. If the search is successful, you will see your device on a map, pinpointing it's location. Before you sprint out the door to get it, there are some other options you should take a look at.

Once you select your device you will have three additional options in addition to seeing your phone's location. These options are playing a sound, activating "Lost Mode" and erase the phone.

Playing the sound is a great way to find your phone if you lost it somewhere around your house. If you click the option, an audio alert will go off on your phone which will hopefully help you find it. The alert will sound like a loud pinging noise alerting you that your phone is at home with you and not at the coffee shop you just visited. If you hear the pinging sound then you'll quickly find your phone by just following the sound.

When enabled, Lost Mode will lock your phone with a passcode and will display a message of your choice. This can either ensure it will be safe until you can find it, or will alert the thief what you expect of them and that you know where they are. This mode can also enable location services on your phone too.

However, if things have gone too far and you think there is a very slim chance you will ever get your device back – perhaps your phone has already crossed an international border – the best course of action is to simply erase it. Yes, this is giving up, but it also prevents your personal information getting into the hands of someone who could abuse it.

If you follow these steps, you should have your phone back in your pocket in no time. 

Is there an app to track someones phone without them knowing?

maxresdefault-11

What if you're looking for someone else's phone? I'm sorry to burst your bubble, but you are not allowed to track someone else's phone without their knowledge. While there are supposedly apps that you can install on a target's phone to track it and keep tabs on what they are doing on it, that is completely illegal and immoral. In addition to the moral issue, there is the practical fact that they could find the app which could lead to a very awkward situation, possibly one involving the police.

However, there are times when you want to find a friend's phone and you have a legitimate reason, and (the important part) they have given you permission to find it. Just as when you were looking for your own phone, there is an app that can help you find the phones of your friends and family with ease. The "Find My Friends" app used to be an extra download, but now it comes with iOS, so if your friends have ever updated their phone, they should have it.

"Find My Friends" is an app that basically allows you to share your location with others and vice versa. It can be great for keeping track of where your kids are, knowing what your significant other is doing, or just keeping tabs on your friends. It can also help them find a lost phone (as long as you have "Shared Locations" with them). Here is how to set it up:

Step 1: Open the app on your phone and the phone of the person you want to be able to share locations with.

Step 2: Click your profile in the bottom left of the screen.

Step 3: Enable "Share My Location" and make sure AirDrop is enabled on your own phone.

Step 4: From there, your friends and family will be able to search/add you to share your location with them and vice versa. You each will need to accept the "Shared Location" request from the other. Now, you can just click on their profile in the app and keep track of them.

As you likely realized while reading this article, it is a much better idea to be proactive than reactive when it comes to tracking phones. If you set up "Find My iPhone" and "Find My Friends" before your phone gets stolen or lost, it will save you a lot of potential hassle down the road. While it may be a bit worrisome to have someone be able to see your location at all times, it can really save you once your phone goes missing and you need to track it down. It is obviously best to pick someone who you trust not to take advantage of the information an app like "Find My Friends" can provide them.

No one deserves to have their phone stolen or go missing, but thankfully, there are some ways to find it, or at least have the information deleted. Hopefully, this guide helped you be able to find your phone or the phone of your friends and family, or at least prepared you for when it may happen.

If you have other ways of finding a lost phone, please share them with us below!

@EVERYTHING NT

Related links


  1. Hacker
  2. Hacking Tools Pc
  3. Pentest Tools Review
  4. Hacking Tools For Windows Free Download
  5. Hacker Tools List
  6. Pentest Tools For Windows
  7. Growth Hacker Tools
  8. Hacker Hardware Tools
  9. Hacker Tools 2020
  10. Best Pentesting Tools 2018
  11. Hacking Tools Online
  12. Hack Apps
  13. Pentest Tools Github
  14. Tools For Hacker
  15. Hacker Tools For Windows
  16. Hacker Tool Kit
  17. Pentest Tools Website
  18. Best Hacking Tools 2019
  19. Pentest Automation Tools
  20. New Hack Tools
  21. How To Install Pentest Tools In Ubuntu
  22. Hacker Tools For Mac
  23. Free Pentest Tools For Windows
  24. Pentest Tools Url Fuzzer
  25. How To Make Hacking Tools

RenApp: The Ultimate File Renaming App



Are you tired of managing your tens of thousands of files like jpgs, pngs, or others and you want a way to manage them as quick as possible then RenApp is solution for all problem.
RenApp lets you change names of many files of a particular type to a common name with added numbering. So no more time wasting in file management just four clicks and your files will be ordered.

Beside that RenApp can clean your folders and subfolders from backup files of .bak or .*~ extension. Removing backup files in order to make space available manually is a tedious work and can take lots of time but why do it that we've got RenApp just locate the folder and click remove it'll remove them all from that folder and its subfolders. 

Some of the features of RenApp are as:
  •    Rename files to a common name.
  •    Rename files of different extensions to a common name in one shot
  •    Remove backup files from folder and subfolders.
R  RenApp is free and Opensource, written in Python with QT interface. Check out the source code at sourceforge.


Read more
  1. How To Install Pentest Tools In Ubuntu
  2. Hacker Tools
  3. Hacker Tools Hardware
  4. Bluetooth Hacking Tools Kali
  5. Hack Tools Pc
  6. Hack Tools 2019
  7. Hacks And Tools
  8. Hacking Tools
  9. Pentest Automation Tools
  10. Pentest Tools Open Source
  11. Black Hat Hacker Tools
  12. Physical Pentest Tools
  13. Pentest Tools For Mac
  14. Hacking Tools
  15. Top Pentest Tools

How To Install And Run Backtrack On Android

Guide you step by step to How to install and run Backtrack on android. As the Backtrack is also available with ARM architecture which makes it possible to run Backtrack on an ARM machine such as mobiles or tablets.
Recently, We are discussed Install and Run BackTrack on Windows. Android is the best OS for penetration testing. It designed for digital forensics and penetration testing or hacking tool. It comes with many more updated tools. As the Backtrack is also available with ARM architecture which makes it possible to run Backtrack on an ARM machine such as mobiles or tablets.
How To Install and Run Backtrack On AndroidRequirements
Step to Install and Run Backtrack On Android:
First of all extract the BT5-GNOME-ARM.7z. and copy the "BT5" folder and then put in your phone's root directory. Here mine phone is /sdcard. The root directory is different for different mobile devices.
  • Now install all the above apps BusyboxAndroid TerminalAndroid Vnc.
  • After installing BusyBox application open it and wait until it finishes loading and then click on Smart install.
  • Now open the android terminal and type the following command:
    su cd /sdcard/BT5sh bootbtNOTE :- When you type su in terminal it will ask you for superuser request and you have to tap on Grant.
  • After this, type the following commands in terminal.
    export USER=rootvncpasswd
  • After entering vncpasswd the terminal will ask you to enter the password. Enter the desired password and hit enter.
  • Now type the following commands.
    tightvncserver -geometry 1280×720
  • The terminal emulator will create the localhost to connect it to VNC server. Now note the localhost port marked red below. Now minimize the terminal emulator.
  • Open the Android VNC and type the following settings.
Nickname : BT5
Password : your password here which you entered in terminal (step no.6)
Address : localhost
Port : 5906
NOTE: Make sure that your localhost's port matches with terminal's localhost. Here mine New 'X' desktop is localhost:6. You may be different. So, in VNC type Port 590X where the "X" is the localhost in the android terminal.
That's it now just tap on connect to run the Backtrack on your android. So in this way you successfully install and run backtrack 5 on android. If you face any problem feel free to discuss in below comments!
Read more
  1. Hack Tools For Games
  2. New Hack Tools
  3. Hacker Tools Windows
  4. Best Pentesting Tools 2018
  5. Pentest Tools Bluekeep
  6. Hacking Tools Free Download
  7. Hacker Tool Kit
  8. Wifi Hacker Tools For Windows
  9. Easy Hack Tools
  10. Hack Tools For Windows
  11. Hacking Tools For Pc
  12. Hacker Tools 2019
  13. Pentest Tools Kali Linux
  14. Underground Hacker Sites
  15. Beginner Hacker Tools
  16. Pentest Tools List
  17. Hacker Tools For Ios
  18. Hacker Search Tools
  19. Hacking Tools For Mac
  20. Hacker Tools For Pc
  21. Hacker Techniques Tools And Incident Handling
  22. Hacker Tools Apk
  23. What Are Hacking Tools
  24. How To Hack
  25. Pentest Tools Nmap
  26. Hacker Tools Mac

Encuentros Virtuales Con "Hackers" En @0xWord Y Mi Participación En Un Podcast Muy (Poco) Canalla

Durante este periodo de confinamiento la comunidad de hackers no se ha parado, y ha habido multitud de conferencias virtuales, podcasts, charlas e incluso una "MegaCon" como fue la c0r0n4con que unió a profesionales de todo el mundo durante varios días, incluida la charla de Hidden Networks de que os hablaba ayer. En este orden de cosas, nosotros hemos tenido ya dos encuentros virtuales de autores - y hackers - de los que han escrito algunos de los libros más vendidos de 0xWord, y yo mismo he participado en un podcast.

Figura 1: Encuentros Virtuales con "hackers" en 0xWord
y mi participación en un Podcast muy (poco) canalla

En el Primer Encuentro Virtual estuvieron Sergio de los Santos - autor de Máxima Seguridad en Windows Gold Edition y Una al día -, Fran Ramírez - autor de Microhistorias, Docker: SecDevOps y Machine Learning Aplicado a Ciberseguridad -, Carlos García - autor de Hacking con Windows  -, Rafael Troncoso "aka" Tuxotron que es autor en Docker:SecDevOps y Microhistorias, y Pablo González - autor de Pentesting con PowerShell, Ethical HackingMetasploit para pentester, Hacking con Metasploit: Advanced Hacking, Hacking Windows o Empire: Pentesting avanzado en el Red Team, entro otros -. 


Figura 2: Encuentro virtual sobre Hackers, Pentesters y trabajar en Ciberseguridad de 0xWord

En este encuentro hablaron de hackers, de hacking, de pentesting, de las profesiones hoy en día en ciberseguridad, en cómo aprender o los mentores de algunos de ellos. Son más de una hora y media de comentarios, charlas y debate entre estos cinco cracks. Por cierto, sus libros, sabéis que están ahora en campaña de descuento en 0xWord.

En segundo lugar, como muchos otros compañeros, yo estuve en la pasada c0r0n4con participando en el podcast de "Cosas de Hackers", en el que The XXLMan y José Manuel Ávalos me hicieron una entrevista personal en la que hablamos durante una hora de Informática 64, de ElevenPaths, de la comunidad, de las charlas o de los trabajos con el equipo de Ideas Locas en Telefonica


Figura 4: Entrevista a Chema Alonso en "Cosas de Hackers"

Y hoy os traigo el 2º encuentro virtual en 0xWord en este caso contando con la presencia de Beatriz Cerrolaza, CEO de MyPublicInbox, Alvaro Núñez-Romero - autor del libro "Arduino para Hackers: Pocs & Hacks Just for Fun" y de Pilar Vila, autora del libro "Técnicas de Análisis Forense para Peritos Judiciales Profesionales", moderado todo el encuentro por Fran Ramírez y Pablo González. Una hora para escuchar con calma.


Figura 5: 2º Encuentro virtual 0xWord con Beatriz Cerrolaza, Pilar Vila y Alvaro Nuñez-Romero

Mientras que dejamos que nuestros especialistas nos ayuden, nosotros seguiremos quedándonos en casa. En homenaje a los que luchan por nosotros, además de traer a Cálico Electrónico a luchar con el Coronavirus, también hemos sacado a Donramon y Perchita para luchar contra el COVID-19.. aunque pille cacho el pobre Cobi.


Figura 6: Donramon y Perchica contra el Covid-19

Por suerte, este periodo de confinamiento nos ha llegado con la existencia de la tecnología, con las redes de comunicaciones de alta velocidad y podemos disfrutar de cosas como la vídeo conferencia que, creedme, cuando yo era solo un niño era algo como ciencia-ficción. Gracias hackers de antaño por evolucionar la tecnología.

Saludos Malignos!

Autor: Chema Alonso (Contactar con Chema Alonso)



Related articles


Thousand Ways To Backdoor A Windows Domain (Forest)

When the Kerberos elevation of privilege (CVE-2014-6324 / MS14-068) vulnerability has been made public, the remediation paragraph of the following blog post made some waves:
http://blogs.technet.com/b/srd/archive/2014/11/18/additional-information-about-cve-2014-6324.aspx

"The only way a domain compromise can be remediated with a high level of certainty is a complete rebuild of the domain."

Personally, I agree with this, but .... But whether this is the real solution, I'm not sure. And the same applies to compromised computers. When it has been identified that malware was able to run on the computer (e.g. scheduled scan found the malware), there is no easy way to determine with 100% certainty that there is no rootkit on the computer. Thus rebuilding the computer might be a good thing to consider. For paranoids, use new hardware ;)

But rebuilding a single workstation and rebuilding a whole domain is not on the same complexity level. Rebuilding a domain can take weeks or months (or years, which will never happen, as the business will close before that).

There are countless documented methods to backdoor a computer, but I have never seen a post where someone collects all the methods to backdoor a domain. In the following, I will refer to domain admin, but in reality, I mean Domain Admins, Enterprise Admins, and Schema Admins.


Ways to backdoor a domain

So here you go, an incomplete list to backdoor a domain:

  • Create a new domain admin user. Easy to do, easy to detect, easy to remediate
  • Dump password hashes. The attacker can either crack those or just pass-the-hash. Since KB2871997, pass-the-hash might be trickier (https://technet.microsoft.com/library/security/2871997), but not impossible. Easy to do, hard to detect, hard to remediate - just think about service user passwords. And during remediation, consider all passwords compromised, even strong ones.
  • Logon scripts - modify the logon scripts and add something malicious in it. Almost anything detailed in this post can be added :D
  • Use an already available account, and add domain admin privileges to that. Reset its password. Mess with current group memberships - e.g. http://www.exploit-db.com/papers/17167/
  • Backdoor any workstation where domain admins login. While remediating workstations, don't forget to clean the roaming profile. The type of backdoor can use different forms: malware, local admin, password (hidden admin with 500 RID), sticky keys, etc.
  • Backdoor any domain controller server. For advanced attacks, see Skeleton keys 
  • Backdoor files on network shares which are commonly used by domain admins by adding malware to commonly used executables - Backdoor factory
  • Change ownership/permissions on AD partitions - if you have particular details on how to do this specifically, please comment
  • Create a new domain user. Hide admin privileges with SID history. Easy to do, hard to detect, easy to remediate - check Mimikatz experimental for addsid
  • Golden tickets - easy to do, hard to detect, medium remediation
  • Silver tickets - easy to do, hard to detect, medium/hard remediation
  • Backdoor workstations/servers via group policy
    • HKEY_LOCAL_MACHINE\ Software\ Microsoft\ Windows\ CurrentVersion\ RunOnce,
    • scheduled tasks (run task 2 years later),
    • sticky-keys with debug
  • Backdoor patch management tool, see slides here
[Update 2017.01.10]


Other tricks

The following list does not fit in the previous "instant admin" tips, but still, it can make the attackers life easier if their primary foothold has been disabled:

  • Backdoor recent backups - and when the backdoor is needed, destroy the files, so the files will be restored from the backdoored backup
  • Backdoor the Exchange server - get a copy of emails
  • Backdoor workstation/server golden image
  • Change permission of logon scripts to allow modification later
  • Place malicious symlinks to file shares, collect hashes via SMB auth tries on specified IP address, grab password hashes later
  • Backdoor remote admin management e.g. HP iLO - e.g. create new user or steal current password
  • Backdoor files e.g. on shares to use in SMB relay
  • Backdoor source code of in-house-developed software
  • Use any type of sniffed or reused passwords in new attacks, e.g. network admin, firewall admin, VPN admin, AV admin, etc.
  • Change the content of the proxy pac file (change browser configuration if necessary), including special exception(s) for a chosen domain(s)  to use proxy on malicious IP. Redirect the traffic, enforce authentication, grab password hashes, ???, profit.
  • Create high privileged users in applications running with high privileges, e.g. MSSQL, Tomcat, and own the machine, impersonate users, grab their credentials, etc. The typical pentest path made easy.
  • Remove patches from servers, change patch policy not to install those patches.
  • Steal Windows root/intermediate CA keys
  • Weaken AD security by changing group policy (e.g. re-enabling LM-hashes)
Update [2015-09-27]: I found this great presentation from Jakob Heidelberg. It mentions (at least) the following techniques, it is worth to check these:
  • Microsoft Local Administrator Password Solution
  • Enroll virtual smart card certificates for domain admins

Forensics

If you have been chosen to remediate a network where attackers gained domain admin privileges, well, you have a lot of things to look for :)

I can recommend two tools which can help you during your investigation:

Lessons learned

But guess what, not all of these problems are solved by rebuilding the AD. One has to rebuild all the computers from scratch as well. Which seems quite impossible. When someone is creating a new AD, it is impossible not to migrate some configuration/data/files from the old domain. And whenever this happens, there is a risk that the new AD will be backdoored as well.

Ok, we are doomed, but what can we do? I recommend proper log analysis, analyze trends, and detect strange patterns in your network. Better spend money on these, than on the domain rebuild. And when you find something, do a proper incident response. And good luck!

Ps: Thanks to Andrew, EQ, and Tileo for adding new ideas to this post.

Check out the host backdooring post as well! :)
Related posts

  1. Hacking Tools For Windows Free Download
  2. Hack Tools Pc
  3. Hack App
  4. Hacking Tools For Pc
  5. Pentest Tools For Windows
  6. Game Hacking
  7. Hacking Tools Software
  8. Hacker Tools Software
  9. Kik Hack Tools
  10. Pentest Tools Download
  11. Pentest Tools Bluekeep
  12. What Is Hacking Tools
  13. Underground Hacker Sites
  14. New Hack Tools
  15. Hacker Tools Free Download
  16. Usb Pentest Tools
  17. Hacker Tools Apk
  18. Pentest Tools Url Fuzzer
  19. Tools 4 Hack
  20. Hack Tools For Games
  21. Pentest Tools Download
  22. Hacking Tools Windows
  23. Hack Tools For Pc

SigPloit SS7 Tool

Continue reading
  1. Hacker Tools Github
  2. Hacking Tools For Beginners
  3. Black Hat Hacker Tools
  4. Hackers Toolbox
  5. Hacking Tools Windows 10
  6. Pentest Tools Android
  7. Hak5 Tools
  8. Hacking Tools Download
  9. Hack Tools For Windows
  10. Pentest Tools Github
  11. Hacking Tools And Software
  12. Hack Website Online Tool
  13. Bluetooth Hacking Tools Kali
  14. Game Hacking
  15. Android Hack Tools Github
  16. Nsa Hack Tools
  17. Pentest Tools Bluekeep
  18. Hacking Tools Kit
  19. Hack Tools Download
  20. Hacker Tools For Pc
  21. Hacking Tools Software
  22. Pentest Tools Alternative
  23. Hacking Tools Download
  24. New Hack Tools
  25. Pentest Tools Github
  26. Hacking Tools Online
  27. Github Hacking Tools
  28. Pentest Tools For Mac

quarta-feira, 15 de abril de 2020

What Is Cybercrime? What Are The Types Of Cybercrime? What Is Cyberlaw In India?

What is cyber crime?

Cybercrime is the use of computers & networks to perform illegal activities such as spreading viruses,online  bullying,performing unauthorized electronic fund transfers etc. Most cyber crimes are committed through the internet.
Some cyber crime also be carried out using mobile phones via Sms and online chatting applications.

TYPES OF CYBERCRIME

The following list presents the common types of cybercrimes-

1-Computer Fraud-Intential deception for personal gain via the use of computer system.

2-Privacy Violations-Exposing personal information such as email addresses,phone numbers,account details etc, on social media,websites,etc.

3-Identity theft-Stealing personal information from somebody and impersonating that person.

4-Sharing copyright files/information-This involves distributing copyright protected files such as eBooks and computer program etc.

5-Electronic funds transfer-This involves gaining an unauthorized access to bank computer networks and making illegal funds transferring.

6-Electronic money laundering-This involves the use of the computer to launder money.

7-Atm fraud-This involves intercepting ATM card details such as account numbers and PIN numbers.These details are then used to withdraw funds from the intercepted accounts.

8-Denial of service attack-This involves the use of computers in multiple locations to attack servers with a view of shutting them down.

9-Spam:sending unauthorized emails.
These emails usually contain advertisements.


CYBER LAW

Under The Information Technology Act,2000 
CHAPTER XI-OFFENCES-66. Hacking with computer system.

1-whoever with the Intent to cause or knowing that he is likely to cause Wrongfull Loss or Damage to the public or any person Destroys or Deletes or Alter any Information Residing in computer Resource or diminishes its value or utility or affects it injuriously by any means, commits hack.

2-whoever commits hacking shell be punished with imprisonment up to three years, or  with fine which may extend up to two lakh rupees,or with both.
Related articles

  1. Tools Used For Hacking
  2. Hacker Tools
  3. What Is Hacking Tools
  4. Hack Tools Pc
  5. New Hack Tools
  6. Android Hack Tools Github
  7. Wifi Hacker Tools For Windows
  8. Hacking Tools For Games
  9. Nsa Hacker Tools
  10. Pentest Tools Framework
  11. Pentest Tools For Android
  12. Hacking Tools 2019
  13. Pentest Tools Open Source
  14. Hack Tools For Mac
  15. Hacks And Tools
  16. Game Hacking
  17. Hacker Tools For Ios
  18. Hacking Tools Download

Facebook Plans To Launch Its Own Cryptocurrency

Facebook Plans To Launch Its Own Cryptocurrency

Facebook Plans To Launch Its Own Cryptocurrency

Facebook Plans To Launch Its Own Cryptocurrency

The social network giant, Facebook is going through a bad phase with lots of ups and down. The recent scandal with Cambridge Analytica has caused the world's largest social network giant Facebook to change its stance on user privacy and to be more transparent about its use of the data it collects.
Since then, some social networks based in Blockchain have been popularized, namely Sphere, Steemit, and Howdoo. However, recently, something unusual announcement is announced by the social network giant Facebook itself, in which Facebook stated that it is investing in a Blockchain-based solution development team, but, the purpose of the project is not yet known.
It was with a post on the Facebook page that David Marcus confirmed his departure from the Messenger team and the creation of a small group dedicated to finding solutions based on the potential of Blockchain technology for Facebook.
David Marcus has not given much detail on the work he will do with his new group, saying only that they will study Blockchain from scratch so that they can use this revolutionary technology for Facebook.
"I'm setting up a small group to explore how to leverage Blockchain across Facebook, starting from scratch," stated David Marcus.
Despite being connected to Facebook's Messenger since 2014, David Marcus is no novice in these financial issues related to money transfers. In addition to having introduced the possibility of P2P payments in Messenger itself, David Marcus was President of PayPal and CEO of Zong, a company dedicated to payments on mobile devices.
However, his experience in this segment does not allow us to conclude that Facebook will create or support a crypto coin, but, it also doesn't mean that it will launch or support any crypto coin of its own. Blockchain technology has become famous thanks to crypto-coins, especially Bitcoin, but its potential expands dramatically to other areas.
The potential of Blockchain goes from the crypto-coins to the creation of real ecosystems online, supported by the users of the network. Sharing and storing data is a legacy that Blockchain allows you to explore and maybe the fact that Facebook will use it in your favor.
The lead post in Messenger was then handed over to Stan Chudnovsky, who now heads one of the most widely used communication services around the world, alongside WhatsApp.
Rumors also point out that James Everingham and Kevin Weil, both from Instagram, will also join David Marcus in this new onslaught of Facebook to one of today's most acclaimed technologies.

More info